INFA 640 Cryptology and data protection

Assignment Help Computer Network Security
Reference no: EM13496589

INFA 640: Cryptology and Data Protection

1. A 2,000-bit message is used to generate a 256-bit hash. One the average, how many other messages could be expected to generate the same hash value? What does this tell us about the length of a hash as compared to the length of the message?

2. Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,… , pn} and corresponding ciphertext = {c1, c2,… , cn}. Suppose the encryption function is               ci = pi + 5 (mod 26).  If you receive the ciphertext message RNQJDHDWZX, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?  What are some weaknesses of this cipher?

3. Substantiate or refute the following statement: The cryptographic basis of the Enigma machine is the use of a trapdoor function.

5. A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function.  In the process of encrypting a message, a character in the plaintext, a capital R, is XORed with the pseudorandom byte 10010101.

a. What is the ciphertext (in binary form) generated by the encryption of the character R? (Please show your work.)   

b. How is the plaintext for this encrypted R recovered? (Please show your work.)

6. The following ciphertext is a monoalphabetic ciper: 

ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ

Decrypt this message, and briefly describe your cryptanalysis methodology.  In particular, list features of the ciphertext that hindered or helped your decryption process.

7. An organization has 2000 members.  It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.  How many unique keys are required if:

a. The organization uses a symmetric cipher.

b. The organization uses an asymmetric cipher.

 

8. The following questions are worth 2 points each:

a. Bob picked N=77 for use in a RSA-encrypted message. Since N is part of the public key, Alice was able to crack Bob’s message by determining the values of p and q that Bob used. What are the values of p and q did she determined?

b. Is 89,201,768 a prime number? Why or why not?

 

10. Modular arithmetic is used in public key ciphers. What is the value of  X for each of the following:

a. X = 1,233 mod 16

b. X = 6 mod 50

c. X = 60 mod 5

d. X = 50 mod 6

 

12. Using RSA, let p = 19, q = 13 and e = 5.  Which of these is the complete private key:

a. (169, 247)

b. (173, 247)

c. (169, 216)

d. (173, 216)

e. None of the above.

(For full credit, please show your reasoning.)

13. Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key.  The company decides to conduct a “challenge” to crack an encrypted message using a brute-force approach.  The average time to crack the message is found to be 12 hrs.  How many more bits would they need to add to the key to increase the average cracking time to 3072 hrs?

14. Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable idea? Why, or why not.

15. You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 29. You have secretly picked the value SA = 23.You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 17.  What is the value of your shared secret key?

16. Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 128 bit hash. Alice, unbeknownst to Bob, changes a single character in Bob’s file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

17. Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption. Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice.  You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message.

18. Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter’s position in the alphabet, i.e., VA = 1, VB = 2, …, VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 …x VChar N) mod(26). Bob uses this function to send a one-word message, PLANE, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob’s original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob’s original hash.

19. Do symmetric and asymmetric ciphers protect the integrity of the messages that they encrypt? If not, how could that service be provided?

Reference no: EM13496589

Questions Cloud

Statements about gender differences : Which of the following statements about gender differences is correct? What happens in the brain to create a long-term memory? What does the scientific evidence suggest about gender differences?
Girls brains and newborn babys brain : An unfortunate outcome of patient "H.M.'s" surgery was. What is true about a newborn baby's brain? Girls' brains
In interacting with children-evidence indicates : In interacting with children, fathers tend to. Recent evidence indicates that
Eating disorders-epigenetic research : Which of the following statements about aging is true? What happens in a typical teen's brain? Eating disorders. Identical twins share the same physical make-up. What does epigenetic research suggest? Epigenetic research suggests that
INFA 640 Cryptology and data protection : INFA 640,  Cryptology and data protection  Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable ide..
Define the leadership contingency theory : Define the Leadership Contingency Theory. Discuss the relationship between matching qualities of leaders, characteristics of the followers and the situational factors; Give an example of how this takes place (either from history or personal)
Research report summarizes the results of the hypothesis : A research report summarizes the results of the hypothesis test by stating, "z = 2.13, p
The standard error of m gets smaller : The standard error of M gets smaller as
Liklihood of rejecting the null hypothesis : If other factors are held constant, how does increasing the sample variance affect the value of the independent- measures t statistic and the liklihood of rejecting the null hypothesis?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Discuss the risks of having a single root user

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (500 words..

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Question about virtue ethics

Based on virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take.

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd